Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2019-3822

Disclosure Date: February 06, 2019
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large ‘nt response’ data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a ‘large value’ needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
9.8 Critical
Impact Score:
5.9
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • canonical,
  • debian,
  • haxx,
  • netapp,
  • oracle,
  • redhat,
  • siemens

Products

  • active iq unified manager,
  • clustered data ontap,
  • communications operations monitor 3.4,
  • communications operations monitor 4.0,
  • debian linux 9.0,
  • enterprise linux 8.0,
  • enterprise manager ops center 12.3.3,
  • enterprise manager ops center 12.4.0,
  • http server 12.2.1.3.0,
  • libcurl,
  • mysql server,
  • oncommand insight -,
  • oncommand workflow automation -,
  • secure global desktop 5.4,
  • services tools bundle 19.2,
  • sinema remote connect client,
  • snapcenter -,
  • ubuntu linux 14.04,
  • ubuntu linux 16.04,
  • ubuntu linux 18.04,
  • ubuntu linux 18.10
Technical Analysis